Blog

"Prevention is cheaper than a breach"

Live Vulnerability Intelligence

Threat Database

Search CVEs, inspect descriptions, and open detail pages with AI-assisted technical context.

Total3,037
Critical0
High3,037
Medium0
Reset
Showing 381-400 of 3037 records
Threat Entry Updated 2026-02-03

CVE-2026-0861 - Glibc Plugin

Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for…

PLUGIN Glibc

CVE-2026-0861

HIGH CVSS 8.4 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-23492 - Pimcore Plugin

Pimcore is an Open Source Data & Experience Management Platform. Prior to 12.3.1 and 11.5.14, an incomplete SQL injection patch in the Admin Search Find API allows an authenticated attacker to perform blind SQL injection. Although CVE-2023-30848 attempted to mitigate SQL injection by removing SQL comments (--) and catching syntax errors, the fix is insufficient. Attackers can still inject SQL payloads that do not rely on comments and infer database information via blind techniques. This vulnerability affects the admin interface and can lead to database information disclosure. This vulnerability is…

PLUGIN Pimcore

CVE-2026-23492

HIGH CVSS 8.8 2026-01-14
Threat Entry Updated 2026-01-28

CVE-2026-23498 - Shopware Plugin

Shopware is an open commerce platform. From 6.7.0.0 to before 6.7.6.1, a regression of CVE-2023-2017 leads to an array and array crafted PHP Closure not checked being against allow list for the map(...) override. This vulnerability is fixed in 6.7.6.1.

PLUGIN Shopware

CVE-2026-23498

HIGH CVSS 7.2 2026-01-14
Threat Entry Updated 2026-01-26

CVE-2026-23477 - Rocket.Chat Plugin

Rocket.Chat is an open-source, secure, fully customizable communications platform. In Rocket.Chat versions up to 6.12.0, the API endpoint GET /api/v1/oauth-apps.get is exposed to any authenticated user, regardless of their role or permissions. This endpoint returns an OAuth application, as long as the user knows its ID, including potentially sensitive fields such as client_id and client_secret. This vulnerability is fixed in 6.12.0.

PLUGIN Rocket.Chat

CVE-2026-23477

HIGH CVSS 7.7 2026-01-14
Threat Entry Updated 2026-01-20

CVE-2026-22787 - html2pdf.js Plugin

html2pdf.js converts any webpage or element into a printable PDF entirely client-side. Prior to 0.14.0, html2pdf.js contains a cross-site scripting (XSS) vulnerability when given a text source rather than an element. This text is not sufficiently sanitized before being attached to the DOM, allowing malicious scripts to be run on the client browser and risking the confidentiality, integrity, and availability of the page's data. This vulnerability has been fixed in html2pdf.js@0.14.0.

PLUGIN html2pdf.js

CVE-2026-22787

HIGH CVSS 8.7 2026-01-14
Threat Entry Updated 2026-02-03

CVE-2026-22708 - Cursor Plugin

Cursor is a code editor built for programming with AI. Prior to 2.3, hen the Cursor Agent is running in Auto-Run Mode with Allowlist mode enabled, certain shell built-ins can still be executed without appearing in the allowlist and without requiring user approval. This allows an attacker via indirect or direct prompt injection to poison the shell environment by setting, modifying, or removing environment variables that influence trusted commands. This vulnerability is fixed in 2.3.

PLUGIN Cursor

CVE-2026-22708

HIGH CVSS 7.2 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2026-0532 - Kibana Plugin

External Control of File Name or Path (CWE-73) combined with Server-Side Request Forgery (CWE-918) can allow an attacker to cause arbitrary file disclosure through a specially crafted credentials JSON payload in the Google Gemini connector configuration. This requires an attacker to have authenticated access with privileges sufficient to create or modify connectors (Alerts & Connectors: All). The server processes a configuration without proper validation, allowing for arbitrary network requests and for arbitrary file reads.

PLUGIN Kibana

CVE-2026-0532

HIGH CVSS 8.6 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2025-14770 - Shipping Rate By Cities Plugin

The Shipping Rate By Cities plugin for WordPress is vulnerable to SQL Injection via the 'city' parameter in all versions up to, and including, 2.0.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

PLUGIN Shipping Rate By Cities

CVE-2025-14770

HIGH CVSS 7.5 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2025-15378 - Ajs Footnotes Plugin

The AJS Footnotes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'note_list_class' and 'popup_display_effect_in' parameters in all versions up to, and including, 1.0 due to missing authorization and nonce verification on settings save, as well as insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to update plugin settings and inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Ajs Footnotes

CVE-2025-15378

HIGH CVSS 7.2 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2025-15283 - Name Directory Plugin

The Name Directory plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'name_directory_name' and 'name_directory_description' parameters in all versions up to, and including, 1.30.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

PLUGIN Name Directory

CVE-2025-15283

HIGH CVSS 7.2 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2025-15266 - Geeky Bot Plugin

The GeekyBot — Generate AI Content Without Prompt, Chatbot and Lead Generation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the chat message field in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an administrator accesses the Chat History page.

PLUGIN Geeky Bot

CVE-2025-15266

HIGH CVSS 7.2 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2025-14615 - Dashboard Builder Plugin

The DASHBOARD BUILDER – WordPress plugin for Charts and Graphs plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5.7. This is due to missing nonce validation on the settings handler in dashboardbuilder-admin.php. This makes it possible for unauthenticated attackers to modify the stored SQL query and database credentials used by the [show-dashboardbuilder] shortcode via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. The modified SQL query is subsequently executed on…

PLUGIN Dashboard Builder

CVE-2025-14615

HIGH CVSS 7.1 2026-01-14
Threat Entry Updated 2026-01-14

CVE-2025-14613 - Getcontentfromurl Plugin

The GetContentFromURL plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0. This is due to the plugin using wp_remote_get() instead of wp_safe_remote_get() to fetch content from a user-supplied URL in the 'url' parameter of the [gcfu] shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

PLUGIN Getcontentfromurl

CVE-2025-14613

HIGH CVSS 7.2 2026-01-14
Threat Entry Updated 2026-01-21

CVE-2026-22871 - Guarddog Plugin

GuardDog is a CLI tool to identify malicious PyPI packages. Prior to 2.7.1, there is a path traversal vulnerability exists in GuardDog's safe_extract() function that allows malicious PyPI packages to write arbitrary files outside the intended extraction directory, leading to Arbitrary File Overwrite and Remote Code Execution on systems running GuardDog. This vulnerability is fixed in 2.7.1.

PLUGIN Guarddog

CVE-2026-22871

HIGH CVSS 8.7 2026-01-13
Threat Entry Updated 2026-01-21

CVE-2026-22870 - Guarddog Plugin

GuardDog is a CLI tool to identify malicious PyPI packages. Prior to 2.7.1, GuardDog's safe_extract() function does not validate decompressed file sizes when extracting ZIP archives (wheels, eggs), allowing attackers to cause denial of service through zip bombs. A malicious package can consume gigabytes of disk space from a few megabytes of compressed data. This vulnerability is fixed in 2.7.1.

PLUGIN Guarddog

CVE-2026-22870

HIGH CVSS 7.1 2026-01-13
Threat Entry Updated 2026-01-29

CVE-2026-22869 - Eigent Plugin

Eigent is a multi-agent Workforce. A critical security vulnerability in the CI workflow (.github/workflows/ci.yml) allows arbitrary code execution from fork pull requests with repository write permissions. The vulnerable workflow uses pull_request_target trigger combined with checkout of untrusted PR code. An attacker can exploit this to steal credentials, post comments, push code, or create releases.

PLUGIN Eigent

CVE-2026-22869

HIGH CVSS 8.9 2026-01-13
Threat Entry Updated 2026-01-16

CVE-2026-22861 - iccDEV Plugin

iccDEV provides a set of libraries and tools that allow for the interaction, manipulation, and application of International Color Consortium (ICC) color management profiles. Prior to 2.3.1.2, There is a heap-based buffer overflow in SIccCalcOp::Describe() at IccProfLib/IccMpeCalc.cpp. This vulnerability affects users of the iccDEV library who process ICC color profiles. The vulnerability is fixed in 2.3.1.2.

PLUGIN iccDEV

CVE-2026-22861

HIGH CVSS 8.8 2026-01-13
Threat Entry Updated 2026-01-29

CVE-2026-22868 - Go Ethereum Plugin

go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be forced to shutdown/crash using a specially crafted message. This vulnerability is fixed in 1.16.8.

PLUGIN Go Ethereum

CVE-2026-22868

HIGH CVSS 7.1 2026-01-13
Threat Entry Updated 2026-01-29

CVE-2026-22862 - Go Ethereum Plugin

go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be forced to shutdown/crash using a specially crafted message. This vulnerability is fixed in 1.16.8.

PLUGIN Go Ethereum

CVE-2026-22862

HIGH CVSS 7.1 2026-01-13
Threat Entry Updated 2026-01-14

CVE-2026-21299 - Substance3D - Modeler Plugin

Substance3D - Modeler versions 1.22.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

PLUGIN Substance3D - Modeler

CVE-2026-21299

HIGH CVSS 7.8 2026-01-13
Scroll to top